With reports about doctored server motherboards, Dr Steve Bagley on what's to be gained by adding chips to a motherboard.
What Happens When I Press a Key: https://youtu.be/ewE8b7zzej0
Choosing a Password: https://youtu.be/3NjQ9b3pgIg
...and yes, there's a typo at 2mins 33secs - it's hACMEe not Hackmee :) - go and decode the binary in the backdrop instead of writing a comment!
https://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: https://bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com

published:16 Oct 2018

views:111932

This is a live demonstration of hacking into the processor embedded in an SD card, effectively turning the device into a potentially covert Raspberry Pi-class computer under your complete control. The ARM926EJ-SARM processor made its appearance as the embedded CPU in Transcend’s WiFi-enabled SD cards, clocking in at an impressive 426 BogoMips – we can’t possibly leave that territory unexplored, can we?
In this session we root the card’s own CPU, install a more featureful OS, and explore the system’s common and unusual capabilities (in hardware AES encryption and native support for Java bytecode among them). These provide plenty of building blocks for our projects.
I will review the hardware, its capabilities, how to breach its security, and how to enable it with top-class network configuration at boot-up, on nearly any network. I will then show how to build and install additional software and customize the device, using shell script and Perl, for workloads that fit its minute size and low power requirements.
Clearly, complete control of such a hidden computer running with full network connectivity can be used in network penetration scenarios. We’ll discuss applicable security threat countermeasures.
We close the session with a review of similar exploits against hard drive controllers. There is plenty of room at the bottom, and opening these computer-within-the computer configurations create interesting miniaturized automation scenarios alongside the obvious, more ominous security aspects.
Use your newfound knowledge for good, with great power comes great responsibility!
EVENT:
linux.conf.au 2019 — Christchurch, New Zealand
SPEAKER:
Federico Lucifredi
PUBLICATION PERMISSIONS:
Original video was published with the Creative Commons Attribution license (reuse allowed).
ATTRIBUTION CREDITS:
Original video source: https://www.youtube.com/watch?v=cw-rHdE-99Q

published:21 Jul 2019

views:8091

Samy Kamkar is well known for many things, but lately it has been his hardware security hacks that have been turning heads. The nice thing to know is that, despite not having a background in hardware, Samy is able to run with the best of hardware researchers. At the Hackaday SuperConference he offered words of advice for anyone trying to walk the path of discovery with an exciting new piece of electronics. One might say it's a crash-course in how to be a hardware hacker.
Read the article:
Learn more about Samy Kamkar:
Learn more about the Hackaday SuperConference

published:19 Dec 2016

views:99929

The *Starter Kit: HardwareHacking* is about hacking low voltage mainstream devices to connect them with Tinkerforge modules. Any (Embedded-) PC, Smart Phone or Tablet can be used to interact with devices hacked by this kit.
See http://www.tinkerforge.com/en/doc/Kits/HardwareHacking/HardwareHacking.html for more information.

In this episode of Hak5 we're joined by Samy Kamkar, the maker of many portable hacker devices like the MagSpoof and KeySweeper just to name a couple. Read about his developments at https://samy.pl/
-------------------------------
Shop: http://www.hakshop.com
Support: http://www.patreon.com/threatwire
Subscribe: http://www.youtube.com/hak5
Our Site: http://www.hak5.org
Contact Us: http://www.twitter.com/hak5
------------------------------
-~-~~-~~~-~~-~-
Please watch: "BashBunnyPrimer - Hak5 2225"
https://www.youtube.com/watch?v=8j6hrjSrJaM
-~-~~-~~~-~~-~-

published:27 Oct 2016

views:89772

Andrew Zonenberg of IOActive shows how to pull firmware from a chip using a microscope, nail polish, a hot plate and a few chemicals.
We set this up to be like a cooking segment on a morning show. Andrew had chips in various states so he could show it all quickly. The bit that used hazardous chemicals was filmed in advance.
The only downside of this video is we didn't record the feed from the microscope and computer that was available to attendees in the MainStage auditorium.
Video highlights:

Federico Lucifredi
https://2019.linux.conf.au/schedule/presentation/122/
This is a live demonstration of hacking into the processor embedded in an SD card, effectively turning the device into a potentially covert Raspberry Pi-class computer under your complete control. The ARM926EJ-SARM processor made its appearance as the embedded CPU in Transcend’s WiFi-enabled SD cards, clocking in at an impressive 426 BogoMips – we can’t possibly leave that territory unexplored, can we?
In this session we root the card’s own CPU, install a more featureful OS, and explore the system’s common and unusual capabilities (in hardware AES encryption and native support for Java bytecode among them). These provide plenty of building blocks for our projects.
I will review the hardware, its capabilities, how to breach its security, and how to enable it with top-class network configuration at boot-up, on nearly any network. I will then show how to build and install additional software and customize the device, using shell script and Perl, for workloads that fit its minute size and low power requirements.
Clearly, complete control of such a hidden computer running with full network connectivity can be used in network penetration scenarios. We’ll discuss applicable security threat countermeasures.
We close the session with a review of similar exploits against hard drive controllers. There is plenty of room at the bottom, and opening these computer-within-the computer configurations create interesting miniaturized automation scenarios alongside the obvious, more ominous security aspects.
Use your newfound knowledge for good, with great power comes great responsibility!
linux.conf.au is a conference about the Linux operating system, and all aspects of the thriving ecosystem of Free and Open Source Software that has grown up around it. Run since 1999, in a different Australian or New Zealand city each year, by a team of local volunteers, LCA invites more than 500 people to learn from the people who shape the future of Open Source. For more information on the conference see https://linux.conf.au/
#linux.conf.au #linux #foss #opensource

published:25 Jan 2019

views:870

Some of the popular tools used by hackers and penetration testers when doing network analysis or carrying out attacks. These tools work in real life situations and should be used cautiously. If these tools are misused they can cause actual harm to IT infrastructure which could lead to prosecution. Please only use these tools on networks which you own or have permission to test. I am not responsible for your actions! Knowledge is power but with great power comes great responsibility, use wisely.

published:01 Jun 2019

views:603

I'd like to design my own custom UI for my Monoprice select mini 3D printer.
But before writing some software we obviously need to know our enemy and reverse engineer all the hardware components.
In this video I will go through every single detail in how I reverse engineered the MP SelectMini (or Malyan M200) 3D Printer.
AlternativeIDEVideo: https://www.youtube.com/watch?v=EIkGTwLOD7o
Code on GitHub: https://github.com/robin7331/malyan-m200-display-firmware
Esotool.py: https://github.com/espressif/esptool
If you purchase one of the items below I'll get a small commission from amazon. Thanks for your support!
⚒ Tools I currently use
Rigol DS1054Z http://geni.us/u3k2P0P
Ersa i-CON PICO http://geni.us/u3k2P0P
MP Select Mini 3D Printer http://geni.us/Gfp4
iFixit Pro Tech Toolkit http://geni.us/qFxs
❤️ Enjoying my videos?
I put a lot of effort into every single video.
If you like, help me covering my running costs with a dollar or two.
Patreon: https://www.patreon.com/Robin_Reiter
PayPal: https://www.paypal.me/RobinReiterME
You can also support me by ordering something through one of my affiliate links:
Amazon: http://geni.us/7HDBdR
HappyHacking!

published:18 Jun 2017

views:29547

When we heard HackAll The Things, we took it as a challenge. So at DEF CON this year we're doing exactly that, we're hacking everything. We've taken all of our previous experience exploiting embedded devices and used it to bring you a presentation filled with more exploits than ever before™. This presentation will feature exploits for over 20 devices including but not limited to TVs, baby monitors, media streamers, network cameras, home automation devices, and VoIP gateways. Gain root on your devices, run unsigned kernels; it's your hardware, it's internet connected, and it's horribly insecure.
More info at: http://Exploitee.rs
Follow us at: @Exploiteers

Hacker culture

The hacker culture is a subculture of individuals who enjoy the intellectual challenge of creatively overcoming and circumventing limitations of systems to achieve novel and clever outcomes. The act of engaging in activities (such as programming or other media) in a spirit of playfulness and exploration is termed "hacking". However, the defining characteristic of a hacker is not the activities performed themselves (e.g. programming), but the manner in which it is done: hacking entails some form of excellence, for example exploring the limits of what is possible, thereby doing something exciting and meaningful. Activities of playful cleverness can be said to have "hack value" and are termed "hacks" (examples include pranks at MIT intended to demonstrate technical aptitude and cleverness). The hacker culture originally emerged in academia in the 1960s around the Massachusetts Institute of Technology (MIT)'s Tech Model Railroad Club (TMRC) and MIT Artificial Intelligence Laboratory.

Samy Kamkar

Samy Kamkar (born December 10, 1985) is a privacy and security researcher, computer hacker, whistleblower and entrepreneur. At the age of 16, Kamkar dropped out of high school and one year later, co-founded Fonality, a unified communications company based on open source software, which raised over $46 million in private funding. He is possibly best known for creating and releasing the fastest spreading virus of all time, the MySpace worm Samy, and being subsequently raided for it by the United States Secret Service, under the Patriot Act. He is also known for creating SkyJack, a custom drone which hacks into any nearby Parrot drones allowing them to be controlled by its operator, and for creating the Evercookie, which appeared in a top-secret NSA document revealed by Edward Snowden and on the front page of The New York Times. He is also known for his work with The Wall Street Journal and his discovery of the illicit mobile phone tracking where the Apple iPhone, Google Android and Microsoft Windows Phone mobile devices transmit GPS and Wi-Fi information to their parent companies. His mobile research led to a series of class-action lawsuits against the companies and a privacy hearing on Capitol Hill.

3D printing

3D printing, also known as additive manufacturing (AM), refers to various processes used to synthesize a three-dimensional object. In 3D printing, successive layers of material are formed under computer control to create an object. These objects can be of almost any shape or geometry and are produced from a 3D model or other electronic data source. A 3D printer is a type of industrial robot.

Futurologists such as Jeremy Rifkin believe that 3D printing signals the beginning of a third industrial revolution, succeeding the production line assembly that dominated manufacturing starting in the late 19th century. Using the power of the Internet, it may eventually be possible to send a blueprint of any product to any place in the world to be replicated by a 3D printer with "elemental inks" capable of being combined into any material substance of any desired form.

3D printing in the term's original sense refers to processes that sequentially deposit material onto a powder bed with inkjet printer heads. More recently, the meaning of the term has expanded to encompass a wider variety of techniques such as extrusion and sintering-based processes. Technical standards generally use the term additive manufacturing for this broader sense.

Hardware Hacking - Computerphile

With reports about doctored server motherboards, Dr Steve Bagley on what's to be gained by adding chips to a motherboard.
What Happens When I Press a Key: https://youtu.be/ewE8b7zzej0
Choosing a Password: https://youtu.be/3NjQ9b3pgIg
...and yes, there's a typo at 2mins 33secs - it's hACMEe not Hackmee :) - go and decode the binary in the backdrop instead of writing a comment!
https://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: https://bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com

45:24

Hardware Hacking 101

Hardware Hacking 101

Hardware Hacking 101

This is a live demonstration of hacking into the processor embedded in an SD card, effectively turning the device into a potentially covert Raspberry Pi-class computer under your complete control. The ARM926EJ-SARM processor made its appearance as the embedded CPU in Transcend’s WiFi-enabled SD cards, clocking in at an impressive 426 BogoMips – we can’t possibly leave that territory unexplored, can we?
In this session we root the card’s own CPU, install a more featureful OS, and explore the system’s common and unusual capabilities (in hardware AES encryption and native support for Java bytecode among them). These provide plenty of building blocks for our projects.
I will review the hardware, its capabilities, how to breach its security, and how to enable it with top-class network configuration at boot-up, on nearly any network. I will then show how to build and install additional software and customize the device, using shell script and Perl, for workloads that fit its minute size and low power requirements.
Clearly, complete control of such a hidden computer running with full network connectivity can be used in network penetration scenarios. We’ll discuss applicable security threat countermeasures.
We close the session with a review of similar exploits against hard drive controllers. There is plenty of room at the bottom, and opening these computer-within-the computer configurations create interesting miniaturized automation scenarios alongside the obvious, more ominous security aspects.
Use your newfound knowledge for good, with great power comes great responsibility!
EVENT:
linux.conf.au 2019 — Christchurch, New Zealand
SPEAKER:
Federico Lucifredi
PUBLICATION PERMISSIONS:
Original video was published with the Creative Commons Attribution license (reuse allowed).
ATTRIBUTION CREDITS:
Original video source: https://www.youtube.com/watch?v=cw-rHdE-99Q

28:07

Samy Kamkar's Crash Course in How to Be a Hardware Hacker

Samy Kamkar's Crash Course in How to Be a Hardware Hacker

Samy Kamkar's Crash Course in How to Be a Hardware Hacker

Samy Kamkar is well known for many things, but lately it has been his hardware security hacks that have been turning heads. The nice thing to know is that, despite not having a background in hardware, Samy is able to run with the best of hardware researchers. At the Hackaday SuperConference he offered words of advice for anyone trying to walk the path of discovery with an exciting new piece of electronics. One might say it's a crash-course in how to be a hardware hacker.
Read the article:
Learn more about Samy Kamkar:
Learn more about the Hackaday SuperConference

2:27

Starter Kit: Hardware Hacking

Starter Kit: Hardware Hacking

Starter Kit: Hardware Hacking

The *Starter Kit: HardwareHacking* is about hacking low voltage mainstream devices to connect them with Tinkerforge modules. Any (Embedded-) PC, Smart Phone or Tablet can be used to interact with devices hacked by this kit.
See http://www.tinkerforge.com/en/doc/Kits/HardwareHacking/HardwareHacking.html for more information.

Hardware Hacking with Samy Kamkar - Hak5 2109

In this episode of Hak5 we're joined by Samy Kamkar, the maker of many portable hacker devices like the MagSpoof and KeySweeper just to name a couple. Read about his developments at https://samy.pl/
-------------------------------
Shop: http://www.hakshop.com
Support: http://www.patreon.com/threatwire
Subscribe: http://www.youtube.com/hak5
Our Site: http://www.hak5.org
Contact Us: http://www.twitter.com/hak5
------------------------------
-~-~~-~~~-~~-~-
Please watch: "BashBunnyPrimer - Hak5 2225"
https://www.youtube.com/watch?v=8j6hrjSrJaM
-~-~~-~~~-~~-~-

19:03

Hardware Hacking Live at S4x16

Hardware Hacking Live at S4x16

Hardware Hacking Live at S4x16

Andrew Zonenberg of IOActive shows how to pull firmware from a chip using a microscope, nail polish, a hot plate and a few chemicals.
We set this up to be like a cooking segment on a morning show. Andrew had chips in various states so he could show it all quickly. The bit that used hazardous chemicals was filmed in advance.
The only downside of this video is we didn't record the feed from the microscope and computer that was available to attendees in the MainStage auditorium.
Video highlights:

8:47

Top 10 Gadgets Every White & Black Hat Hacker Use & Needs In Their Toolkit

Top 10 Gadgets Every White & Black Hat Hacker Use & Needs In Their Toolkit

Top 10 Gadgets Every White & Black Hat Hacker Use & Needs In Their Toolkit

Hardware hacking 101: There is plenty of room at the bottom

Federico Lucifredi
https://2019.linux.conf.au/schedule/presentation/122/
This is a live demonstration of hacking into the processor embedded in an SD card, effectively turning the device into a potentially covert Raspberry Pi-class computer under your complete control. The ARM926EJ-SARM processor made its appearance as the embedded CPU in Transcend’s WiFi-enabled SD cards, clocking in at an impressive 426 BogoMips – we can’t possibly leave that territory unexplored, can we?
In this session we root the card’s own CPU, install a more featureful OS, and explore the system’s common and unusual capabilities (in hardware AES encryption and native support for Java bytecode among them). These provide plenty of building blocks for our projects.
I will review the hardware, its capabilities, how to breach its security, and how to enable it with top-class network configuration at boot-up, on nearly any network. I will then show how to build and install additional software and customize the device, using shell script and Perl, for workloads that fit its minute size and low power requirements.
Clearly, complete control of such a hidden computer running with full network connectivity can be used in network penetration scenarios. We’ll discuss applicable security threat countermeasures.
We close the session with a review of similar exploits against hard drive controllers. There is plenty of room at the bottom, and opening these computer-within-the computer configurations create interesting miniaturized automation scenarios alongside the obvious, more ominous security aspects.
Use your newfound knowledge for good, with great power comes great responsibility!
linux.conf.au is a conference about the Linux operating system, and all aspects of the thriving ecosystem of Free and Open Source Software that has grown up around it. Run since 1999, in a different Australian or New Zealand city each year, by a team of local volunteers, LCA invites more than 500 people to learn from the people who shape the future of Open Source. For more information on the conference see https://linux.conf.au/
#linux.conf.au #linux #foss #opensource

4:02

Ethical Hacking Tools - Penetration Testing Hardware and Equipment

Ethical Hacking Tools - Penetration Testing Hardware and Equipment

Ethical Hacking Tools - Penetration Testing Hardware and Equipment

Some of the popular tools used by hackers and penetration testers when doing network analysis or carrying out attacks. These tools work in real life situations and should be used cautiously. If these tools are misused they can cause actual harm to IT infrastructure which could lead to prosecution. Please only use these tools on networks which you own or have permission to test. I am not responsible for your actions! Knowledge is power but with great power comes great responsibility, use wisely.

I'd like to design my own custom UI for my Monoprice select mini 3D printer.
But before writing some software we obviously need to know our enemy and reverse engineer all the hardware components.
In this video I will go through every single detail in how I reverse engineered the MP SelectMini (or Malyan M200) 3D Printer.
AlternativeIDEVideo: https://www.youtube.com/watch?v=EIkGTwLOD7o
Code on GitHub: https://github.com/robin7331/malyan-m200-display-firmware
Esotool.py: https://github.com/espressif/esptool
If you purchase one of the items below I'll get a small commission from amazon. Thanks for your support!
⚒ Tools I currently use
Rigol DS1054Z http://geni.us/u3k2P0P
Ersa i-CON PICO http://geni.us/u3k2P0P
MP Select Mini 3D Printer http://geni.us/Gfp4
iFixit Pro Tech Toolkit http://geni.us/qFxs
❤️ Enjoying my videos?
I put a lot of effort into every single video.
If you like, help me covering my running costs with a dollar or two.
Patreon: https://www.patreon.com/Robin_Reiter
PayPal: https://www.paypal.me/RobinReiterME
You can also support me by ordering something through one of my affiliate links:
Amazon: http://geni.us/7HDBdR
HappyHacking!

48:50

Hack All The Things: 20 Devices in 45 Minutes

Hack All The Things: 20 Devices in 45 Minutes

Hack All The Things: 20 Devices in 45 Minutes

When we heard HackAll The Things, we took it as a challenge. So at DEF CON this year we're doing exactly that, we're hacking everything. We've taken all of our previous experience exploiting embedded devices and used it to bring you a presentation filled with more exploits than ever before™. This presentation will feature exploits for over 20 devices including but not limited to TVs, baby monitors, media streamers, network cameras, home automation devices, and VoIP gateways. Gain root on your devices, run unsigned kernels; it's your hardware, it's internet connected, and it's horribly insecure.
More info at: http://Exploitee.rs
Follow us at: @Exploiteers

Hardware Hacking - Computerphile

With reports about doctored server motherboards, Dr Steve Bagley on what's to be gained by adding chips to a motherboard.
What Happens When I Press a Key: https://youtu.be/ewE8b7zzej0
Choosing a Password: https://youtu.be/3NjQ9b3pgIg
...and yes, there's a typo at 2mins 33secs - it's hACMEe not Hackmee :) - go and decode the binary in the backdrop instead of writing a comment!
https://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: https://bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com

published: 16 Oct 2018

Hardware Hacking 101

This is a live demonstration of hacking into the processor embedded in an SD card, effectively turning the device into a potentially covert Raspberry Pi-class computer under your complete control. The ARM926EJ-SARM processor made its appearance as the embedded CPU in Transcend’s WiFi-enabled SD cards, clocking in at an impressive 426 BogoMips – we can’t possibly leave that territory unexplored, can we?
In this session we root the card’s own CPU, install a more featureful OS, and explore the system’s common and unusual capabilities (in hardware AES encryption and native support for Java bytecode among them). These provide plenty of building blocks for our projects.
I will review the hardware, its capabilities, how to breach its security, and how to enable it with top-class network config...

published: 21 Jul 2019

Samy Kamkar's Crash Course in How to Be a Hardware Hacker

Samy Kamkar is well known for many things, but lately it has been his hardware security hacks that have been turning heads. The nice thing to know is that, despite not having a background in hardware, Samy is able to run with the best of hardware researchers. At the Hackaday SuperConference he offered words of advice for anyone trying to walk the path of discovery with an exciting new piece of electronics. One might say it's a crash-course in how to be a hardware hacker.
Read the article:
Learn more about Samy Kamkar:
Learn more about the Hackaday SuperConference

published: 19 Dec 2016

Starter Kit: Hardware Hacking

The *Starter Kit: HardwareHacking* is about hacking low voltage mainstream devices to connect them with Tinkerforge modules. Any (Embedded-) PC, Smart Phone or Tablet can be used to interact with devices hacked by this kit.
See http://www.tinkerforge.com/en/doc/Kits/HardwareHacking/HardwareHacking.html for more information.

Hardware Hacking with Samy Kamkar - Hak5 2109

In this episode of Hak5 we're joined by Samy Kamkar, the maker of many portable hacker devices like the MagSpoof and KeySweeper just to name a couple. Read about his developments at https://samy.pl/
-------------------------------
Shop: http://www.hakshop.com
Support: http://www.patreon.com/threatwire
Subscribe: http://www.youtube.com/hak5
Our Site: http://www.hak5.org
Contact Us: http://www.twitter.com/hak5
------------------------------
-~-~~-~~~-~~-~-
Please watch: "BashBunnyPrimer - Hak5 2225"
https://www.youtube.com/watch?v=8j6hrjSrJaM
-~-~~-~~~-~~-~-

published: 27 Oct 2016

Hardware Hacking Live at S4x16

Andrew Zonenberg of IOActive shows how to pull firmware from a chip using a microscope, nail polish, a hot plate and a few chemicals.
We set this up to be like a cooking segment on a morning show. Andrew had chips in various states so he could show it all quickly. The bit that used hazardous chemicals was filmed in advance.
The only downside of this video is we didn't record the feed from the microscope and computer that was available to attendees in the MainStage auditorium.
Video highlights:

published: 29 Jun 2016

Top 10 Gadgets Every White & Black Hat Hacker Use & Needs In Their Toolkit

Hardware hacking 101: There is plenty of room at the bottom

Federico Lucifredi
https://2019.linux.conf.au/schedule/presentation/122/
This is a live demonstration of hacking into the processor embedded in an SD card, effectively turning the device into a potentially covert Raspberry Pi-class computer under your complete control. The ARM926EJ-SARM processor made its appearance as the embedded CPU in Transcend’s WiFi-enabled SD cards, clocking in at an impressive 426 BogoMips – we can’t possibly leave that territory unexplored, can we?
In this session we root the card’s own CPU, install a more featureful OS, and explore the system’s common and unusual capabilities (in hardware AES encryption and native support for Java bytecode among them). These provide plenty of building blocks for our projects.
I will review the hardware, its capabilities,...

published: 25 Jan 2019

Ethical Hacking Tools - Penetration Testing Hardware and Equipment

Some of the popular tools used by hackers and penetration testers when doing network analysis or carrying out attacks. These tools work in real life situations and should be used cautiously. If these tools are misused they can cause actual harm to IT infrastructure which could lead to prosecution. Please only use these tools on networks which you own or have permission to test. I am not responsible for your actions! Knowledge is power but with great power comes great responsibility, use wisely.

I'd like to design my own custom UI for my Monoprice select mini 3D printer.
But before writing some software we obviously need to know our enemy and reverse engineer all the hardware components.
In this video I will go through every single detail in how I reverse engineered the MP SelectMini (or Malyan M200) 3D Printer.
AlternativeIDEVideo: https://www.youtube.com/watch?v=EIkGTwLOD7o
Code on GitHub: https://github.com/robin7331/malyan-m200-display-firmware
Esotool.py: https://github.com/espressif/esptool
If you purchase one of the items below I'll get a small commission from amazon. Thanks for your support!
⚒ Tools I currently use
Rigol DS1054Z http://geni.us/u3k2P0P
Ersa i-CON PICO http://geni.us/u3k2P0P
MP Select Mini 3D Printer http://geni.us/Gfp4
iFixit Pro Tech Toolkit http...

published: 18 Jun 2017

Hack All The Things: 20 Devices in 45 Minutes

When we heard HackAll The Things, we took it as a challenge. So at DEF CON this year we're doing exactly that, we're hacking everything. We've taken all of our previous experience exploiting embedded devices and used it to bring you a presentation filled with more exploits than ever before™. This presentation will feature exploits for over 20 devices including but not limited to TVs, baby monitors, media streamers, network cameras, home automation devices, and VoIP gateways. Gain root on your devices, run unsigned kernels; it's your hardware, it's internet connected, and it's horribly insecure.
More info at: http://Exploitee.rs
Follow us at: @Exploiteers

Hardware Hacking - Computerphile

With reports about doctored server motherboards, Dr Steve Bagley on what's to be gained by adding chips to a motherboard.
What Happens When I Press a Key: http...

With reports about doctored server motherboards, Dr Steve Bagley on what's to be gained by adding chips to a motherboard.
What Happens When I Press a Key: https://youtu.be/ewE8b7zzej0
Choosing a Password: https://youtu.be/3NjQ9b3pgIg
...and yes, there's a typo at 2mins 33secs - it's hACMEe not Hackmee :) - go and decode the binary in the backdrop instead of writing a comment!
https://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: https://bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com

With reports about doctored server motherboards, Dr Steve Bagley on what's to be gained by adding chips to a motherboard.
What Happens When I Press a Key: https://youtu.be/ewE8b7zzej0
Choosing a Password: https://youtu.be/3NjQ9b3pgIg
...and yes, there's a typo at 2mins 33secs - it's hACMEe not Hackmee :) - go and decode the binary in the backdrop instead of writing a comment!
https://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: https://bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com

Hardware Hacking 101

This is a live demonstration of hacking into the processor embedded in an SD card, effectively turning the device into a potentially covert Raspberry Pi-class c...

This is a live demonstration of hacking into the processor embedded in an SD card, effectively turning the device into a potentially covert Raspberry Pi-class computer under your complete control. The ARM926EJ-SARM processor made its appearance as the embedded CPU in Transcend’s WiFi-enabled SD cards, clocking in at an impressive 426 BogoMips – we can’t possibly leave that territory unexplored, can we?
In this session we root the card’s own CPU, install a more featureful OS, and explore the system’s common and unusual capabilities (in hardware AES encryption and native support for Java bytecode among them). These provide plenty of building blocks for our projects.
I will review the hardware, its capabilities, how to breach its security, and how to enable it with top-class network configuration at boot-up, on nearly any network. I will then show how to build and install additional software and customize the device, using shell script and Perl, for workloads that fit its minute size and low power requirements.
Clearly, complete control of such a hidden computer running with full network connectivity can be used in network penetration scenarios. We’ll discuss applicable security threat countermeasures.
We close the session with a review of similar exploits against hard drive controllers. There is plenty of room at the bottom, and opening these computer-within-the computer configurations create interesting miniaturized automation scenarios alongside the obvious, more ominous security aspects.
Use your newfound knowledge for good, with great power comes great responsibility!
EVENT:
linux.conf.au 2019 — Christchurch, New Zealand
SPEAKER:
Federico Lucifredi
PUBLICATION PERMISSIONS:
Original video was published with the Creative Commons Attribution license (reuse allowed).
ATTRIBUTION CREDITS:
Original video source: https://www.youtube.com/watch?v=cw-rHdE-99Q

This is a live demonstration of hacking into the processor embedded in an SD card, effectively turning the device into a potentially covert Raspberry Pi-class computer under your complete control. The ARM926EJ-SARM processor made its appearance as the embedded CPU in Transcend’s WiFi-enabled SD cards, clocking in at an impressive 426 BogoMips – we can’t possibly leave that territory unexplored, can we?
In this session we root the card’s own CPU, install a more featureful OS, and explore the system’s common and unusual capabilities (in hardware AES encryption and native support for Java bytecode among them). These provide plenty of building blocks for our projects.
I will review the hardware, its capabilities, how to breach its security, and how to enable it with top-class network configuration at boot-up, on nearly any network. I will then show how to build and install additional software and customize the device, using shell script and Perl, for workloads that fit its minute size and low power requirements.
Clearly, complete control of such a hidden computer running with full network connectivity can be used in network penetration scenarios. We’ll discuss applicable security threat countermeasures.
We close the session with a review of similar exploits against hard drive controllers. There is plenty of room at the bottom, and opening these computer-within-the computer configurations create interesting miniaturized automation scenarios alongside the obvious, more ominous security aspects.
Use your newfound knowledge for good, with great power comes great responsibility!
EVENT:
linux.conf.au 2019 — Christchurch, New Zealand
SPEAKER:
Federico Lucifredi
PUBLICATION PERMISSIONS:
Original video was published with the Creative Commons Attribution license (reuse allowed).
ATTRIBUTION CREDITS:
Original video source: https://www.youtube.com/watch?v=cw-rHdE-99Q

Samy Kamkar's Crash Course in How to Be a Hardware Hacker

Samy Kamkar is well known for many things, but lately it has been his hardware security hacks that have been turning heads. The nice thing to know is that, desp...

Samy Kamkar is well known for many things, but lately it has been his hardware security hacks that have been turning heads. The nice thing to know is that, despite not having a background in hardware, Samy is able to run with the best of hardware researchers. At the Hackaday SuperConference he offered words of advice for anyone trying to walk the path of discovery with an exciting new piece of electronics. One might say it's a crash-course in how to be a hardware hacker.
Read the article:
Learn more about Samy Kamkar:
Learn more about the Hackaday SuperConference

Samy Kamkar is well known for many things, but lately it has been his hardware security hacks that have been turning heads. The nice thing to know is that, despite not having a background in hardware, Samy is able to run with the best of hardware researchers. At the Hackaday SuperConference he offered words of advice for anyone trying to walk the path of discovery with an exciting new piece of electronics. One might say it's a crash-course in how to be a hardware hacker.
Read the article:
Learn more about Samy Kamkar:
Learn more about the Hackaday SuperConference

The *Starter Kit: HardwareHacking* is about hacking low voltage mainstream devices to connect them with Tinkerforge modules. Any (Embedded-) PC, Smart Phone or Tablet can be used to interact with devices hacked by this kit.
See http://www.tinkerforge.com/en/doc/Kits/HardwareHacking/HardwareHacking.html for more information.

The *Starter Kit: HardwareHacking* is about hacking low voltage mainstream devices to connect them with Tinkerforge modules. Any (Embedded-) PC, Smart Phone or Tablet can be used to interact with devices hacked by this kit.
See http://www.tinkerforge.com/en/doc/Kits/HardwareHacking/HardwareHacking.html for more information.

Hardware Hacking with Samy Kamkar - Hak5 2109

In this episode of Hak5 we're joined by Samy Kamkar, the maker of many portable hacker devices like the MagSpoof and KeySweeper just to name a couple. Read abou...

In this episode of Hak5 we're joined by Samy Kamkar, the maker of many portable hacker devices like the MagSpoof and KeySweeper just to name a couple. Read about his developments at https://samy.pl/
-------------------------------
Shop: http://www.hakshop.com
Support: http://www.patreon.com/threatwire
Subscribe: http://www.youtube.com/hak5
Our Site: http://www.hak5.org
Contact Us: http://www.twitter.com/hak5
------------------------------
-~-~~-~~~-~~-~-
Please watch: "BashBunnyPrimer - Hak5 2225"
https://www.youtube.com/watch?v=8j6hrjSrJaM
-~-~~-~~~-~~-~-

In this episode of Hak5 we're joined by Samy Kamkar, the maker of many portable hacker devices like the MagSpoof and KeySweeper just to name a couple. Read about his developments at https://samy.pl/
-------------------------------
Shop: http://www.hakshop.com
Support: http://www.patreon.com/threatwire
Subscribe: http://www.youtube.com/hak5
Our Site: http://www.hak5.org
Contact Us: http://www.twitter.com/hak5
------------------------------
-~-~~-~~~-~~-~-
Please watch: "BashBunnyPrimer - Hak5 2225"
https://www.youtube.com/watch?v=8j6hrjSrJaM
-~-~~-~~~-~~-~-

Hardware Hacking Live at S4x16

Andrew Zonenberg of IOActive shows how to pull firmware from a chip using a microscope, nail polish, a hot plate and a few chemicals.
We set this up to be like...

Andrew Zonenberg of IOActive shows how to pull firmware from a chip using a microscope, nail polish, a hot plate and a few chemicals.
We set this up to be like a cooking segment on a morning show. Andrew had chips in various states so he could show it all quickly. The bit that used hazardous chemicals was filmed in advance.
The only downside of this video is we didn't record the feed from the microscope and computer that was available to attendees in the MainStage auditorium.
Video highlights:

Andrew Zonenberg of IOActive shows how to pull firmware from a chip using a microscope, nail polish, a hot plate and a few chemicals.
We set this up to be like a cooking segment on a morning show. Andrew had chips in various states so he could show it all quickly. The bit that used hazardous chemicals was filmed in advance.
The only downside of this video is we didn't record the feed from the microscope and computer that was available to attendees in the MainStage auditorium.
Video highlights:

Hardware hacking 101: There is plenty of room at the bottom

Federico Lucifredi
https://2019.linux.conf.au/schedule/presentation/122/
This is a live demonstration of hacking into the processor embedded in an SD card, ef...

Federico Lucifredi
https://2019.linux.conf.au/schedule/presentation/122/
This is a live demonstration of hacking into the processor embedded in an SD card, effectively turning the device into a potentially covert Raspberry Pi-class computer under your complete control. The ARM926EJ-SARM processor made its appearance as the embedded CPU in Transcend’s WiFi-enabled SD cards, clocking in at an impressive 426 BogoMips – we can’t possibly leave that territory unexplored, can we?
In this session we root the card’s own CPU, install a more featureful OS, and explore the system’s common and unusual capabilities (in hardware AES encryption and native support for Java bytecode among them). These provide plenty of building blocks for our projects.
I will review the hardware, its capabilities, how to breach its security, and how to enable it with top-class network configuration at boot-up, on nearly any network. I will then show how to build and install additional software and customize the device, using shell script and Perl, for workloads that fit its minute size and low power requirements.
Clearly, complete control of such a hidden computer running with full network connectivity can be used in network penetration scenarios. We’ll discuss applicable security threat countermeasures.
We close the session with a review of similar exploits against hard drive controllers. There is plenty of room at the bottom, and opening these computer-within-the computer configurations create interesting miniaturized automation scenarios alongside the obvious, more ominous security aspects.
Use your newfound knowledge for good, with great power comes great responsibility!
linux.conf.au is a conference about the Linux operating system, and all aspects of the thriving ecosystem of Free and Open Source Software that has grown up around it. Run since 1999, in a different Australian or New Zealand city each year, by a team of local volunteers, LCA invites more than 500 people to learn from the people who shape the future of Open Source. For more information on the conference see https://linux.conf.au/
#linux.conf.au #linux #foss #opensource

Federico Lucifredi
https://2019.linux.conf.au/schedule/presentation/122/
This is a live demonstration of hacking into the processor embedded in an SD card, effectively turning the device into a potentially covert Raspberry Pi-class computer under your complete control. The ARM926EJ-SARM processor made its appearance as the embedded CPU in Transcend’s WiFi-enabled SD cards, clocking in at an impressive 426 BogoMips – we can’t possibly leave that territory unexplored, can we?
In this session we root the card’s own CPU, install a more featureful OS, and explore the system’s common and unusual capabilities (in hardware AES encryption and native support for Java bytecode among them). These provide plenty of building blocks for our projects.
I will review the hardware, its capabilities, how to breach its security, and how to enable it with top-class network configuration at boot-up, on nearly any network. I will then show how to build and install additional software and customize the device, using shell script and Perl, for workloads that fit its minute size and low power requirements.
Clearly, complete control of such a hidden computer running with full network connectivity can be used in network penetration scenarios. We’ll discuss applicable security threat countermeasures.
We close the session with a review of similar exploits against hard drive controllers. There is plenty of room at the bottom, and opening these computer-within-the computer configurations create interesting miniaturized automation scenarios alongside the obvious, more ominous security aspects.
Use your newfound knowledge for good, with great power comes great responsibility!
linux.conf.au is a conference about the Linux operating system, and all aspects of the thriving ecosystem of Free and Open Source Software that has grown up around it. Run since 1999, in a different Australian or New Zealand city each year, by a team of local volunteers, LCA invites more than 500 people to learn from the people who shape the future of Open Source. For more information on the conference see https://linux.conf.au/
#linux.conf.au #linux #foss #opensource

Ethical Hacking Tools - Penetration Testing Hardware and Equipment

Some of the popular tools used by hackers and penetration testers when doing network analysis or carrying out attacks. These tools work in real life situations ...

Some of the popular tools used by hackers and penetration testers when doing network analysis or carrying out attacks. These tools work in real life situations and should be used cautiously. If these tools are misused they can cause actual harm to IT infrastructure which could lead to prosecution. Please only use these tools on networks which you own or have permission to test. I am not responsible for your actions! Knowledge is power but with great power comes great responsibility, use wisely.

Some of the popular tools used by hackers and penetration testers when doing network analysis or carrying out attacks. These tools work in real life situations and should be used cautiously. If these tools are misused they can cause actual harm to IT infrastructure which could lead to prosecution. Please only use these tools on networks which you own or have permission to test. I am not responsible for your actions! Knowledge is power but with great power comes great responsibility, use wisely.

I'd like to design my own custom UI for my Monoprice select mini 3D printer.
But before writing some software we obviously need to know our enemy and reverse ...

I'd like to design my own custom UI for my Monoprice select mini 3D printer.
But before writing some software we obviously need to know our enemy and reverse engineer all the hardware components.
In this video I will go through every single detail in how I reverse engineered the MP SelectMini (or Malyan M200) 3D Printer.
AlternativeIDEVideo: https://www.youtube.com/watch?v=EIkGTwLOD7o
Code on GitHub: https://github.com/robin7331/malyan-m200-display-firmware
Esotool.py: https://github.com/espressif/esptool
If you purchase one of the items below I'll get a small commission from amazon. Thanks for your support!
⚒ Tools I currently use
Rigol DS1054Z http://geni.us/u3k2P0P
Ersa i-CON PICO http://geni.us/u3k2P0P
MP Select Mini 3D Printer http://geni.us/Gfp4
iFixit Pro Tech Toolkit http://geni.us/qFxs
❤️ Enjoying my videos?
I put a lot of effort into every single video.
If you like, help me covering my running costs with a dollar or two.
Patreon: https://www.patreon.com/Robin_Reiter
PayPal: https://www.paypal.me/RobinReiterME
You can also support me by ordering something through one of my affiliate links:
Amazon: http://geni.us/7HDBdR
HappyHacking!

I'd like to design my own custom UI for my Monoprice select mini 3D printer.
But before writing some software we obviously need to know our enemy and reverse engineer all the hardware components.
In this video I will go through every single detail in how I reverse engineered the MP SelectMini (or Malyan M200) 3D Printer.
AlternativeIDEVideo: https://www.youtube.com/watch?v=EIkGTwLOD7o
Code on GitHub: https://github.com/robin7331/malyan-m200-display-firmware
Esotool.py: https://github.com/espressif/esptool
If you purchase one of the items below I'll get a small commission from amazon. Thanks for your support!
⚒ Tools I currently use
Rigol DS1054Z http://geni.us/u3k2P0P
Ersa i-CON PICO http://geni.us/u3k2P0P
MP Select Mini 3D Printer http://geni.us/Gfp4
iFixit Pro Tech Toolkit http://geni.us/qFxs
❤️ Enjoying my videos?
I put a lot of effort into every single video.
If you like, help me covering my running costs with a dollar or two.
Patreon: https://www.patreon.com/Robin_Reiter
PayPal: https://www.paypal.me/RobinReiterME
You can also support me by ordering something through one of my affiliate links:
Amazon: http://geni.us/7HDBdR
HappyHacking!

Hack All The Things: 20 Devices in 45 Minutes

When we heard HackAll The Things, we took it as a challenge. So at DEF CON this year we're doing exactly that, we're hacking everything. We've taken all of our...

When we heard HackAll The Things, we took it as a challenge. So at DEF CON this year we're doing exactly that, we're hacking everything. We've taken all of our previous experience exploiting embedded devices and used it to bring you a presentation filled with more exploits than ever before™. This presentation will feature exploits for over 20 devices including but not limited to TVs, baby monitors, media streamers, network cameras, home automation devices, and VoIP gateways. Gain root on your devices, run unsigned kernels; it's your hardware, it's internet connected, and it's horribly insecure.
More info at: http://Exploitee.rs
Follow us at: @Exploiteers

When we heard HackAll The Things, we took it as a challenge. So at DEF CON this year we're doing exactly that, we're hacking everything. We've taken all of our previous experience exploiting embedded devices and used it to bring you a presentation filled with more exploits than ever before™. This presentation will feature exploits for over 20 devices including but not limited to TVs, baby monitors, media streamers, network cameras, home automation devices, and VoIP gateways. Gain root on your devices, run unsigned kernels; it's your hardware, it's internet connected, and it's horribly insecure.
More info at: http://Exploitee.rs
Follow us at: @Exploiteers

Hardware Hacking - Computerphile

With reports about doctored server motherboards, Dr Steve Bagley on what's to be gained by adding chips to a motherboard.
What Happens When I Press a Key: https://youtu.be/ewE8b7zzej0
Choosing a Password: https://youtu.be/3NjQ9b3pgIg
...and yes, there's a typo at 2mins 33secs - it's hACMEe not Hackmee :) - go and decode the binary in the backdrop instead of writing a comment!
https://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: https://bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com

Hardware Hacking 101

This is a live demonstration of hacking into the processor embedded in an SD card, effectively turning the device into a potentially covert Raspberry Pi-class computer under your complete control. The ARM926EJ-SARM processor made its appearance as the embedded CPU in Transcend’s WiFi-enabled SD cards, clocking in at an impressive 426 BogoMips – we can’t possibly leave that territory unexplored, can we?
In this session we root the card’s own CPU, install a more featureful OS, and explore the system’s common and unusual capabilities (in hardware AES encryption and native support for Java bytecode among them). These provide plenty of building blocks for our projects.
I will review the hardware, its capabilities, how to breach its security, and how to enable it with top-class network configuration at boot-up, on nearly any network. I will then show how to build and install additional software and customize the device, using shell script and Perl, for workloads that fit its minute size and low power requirements.
Clearly, complete control of such a hidden computer running with full network connectivity can be used in network penetration scenarios. We’ll discuss applicable security threat countermeasures.
We close the session with a review of similar exploits against hard drive controllers. There is plenty of room at the bottom, and opening these computer-within-the computer configurations create interesting miniaturized automation scenarios alongside the obvious, more ominous security aspects.
Use your newfound knowledge for good, with great power comes great responsibility!
EVENT:
linux.conf.au 2019 — Christchurch, New Zealand
SPEAKER:
Federico Lucifredi
PUBLICATION PERMISSIONS:
Original video was published with the Creative Commons Attribution license (reuse allowed).
ATTRIBUTION CREDITS:
Original video source: https://www.youtube.com/watch?v=cw-rHdE-99Q

Samy Kamkar's Crash Course in How to Be a Hardware Hacker

Samy Kamkar is well known for many things, but lately it has been his hardware security hacks that have been turning heads. The nice thing to know is that, despite not having a background in hardware, Samy is able to run with the best of hardware researchers. At the Hackaday SuperConference he offered words of advice for anyone trying to walk the path of discovery with an exciting new piece of electronics. One might say it's a crash-course in how to be a hardware hacker.
Read the article:
Learn more about Samy Kamkar:
Learn more about the Hackaday SuperConference

Starter Kit: Hardware Hacking

The *Starter Kit: HardwareHacking* is about hacking low voltage mainstream devices to connect them with Tinkerforge modules. Any (Embedded-) PC, Smart Phone or Tablet can be used to interact with devices hacked by this kit.
See http://www.tinkerforge.com/en/doc/Kits/HardwareHacking/HardwareHacking.html for more information.

Hardware Hacking with Samy Kamkar - Hak5 2109

In this episode of Hak5 we're joined by Samy Kamkar, the maker of many portable hacker devices like the MagSpoof and KeySweeper just to name a couple. Read about his developments at https://samy.pl/
-------------------------------
Shop: http://www.hakshop.com
Support: http://www.patreon.com/threatwire
Subscribe: http://www.youtube.com/hak5
Our Site: http://www.hak5.org
Contact Us: http://www.twitter.com/hak5
------------------------------
-~-~~-~~~-~~-~-
Please watch: "BashBunnyPrimer - Hak5 2225"
https://www.youtube.com/watch?v=8j6hrjSrJaM
-~-~~-~~~-~~-~-

Hardware Hacking Live at S4x16

Andrew Zonenberg of IOActive shows how to pull firmware from a chip using a microscope, nail polish, a hot plate and a few chemicals.
We set this up to be like a cooking segment on a morning show. Andrew had chips in various states so he could show it all quickly. The bit that used hazardous chemicals was filmed in advance.
The only downside of this video is we didn't record the feed from the microscope and computer that was available to attendees in the MainStage auditorium.
Video highlights:

Hardware hacking 101: There is plenty of room at the bottom

Federico Lucifredi
https://2019.linux.conf.au/schedule/presentation/122/
This is a live demonstration of hacking into the processor embedded in an SD card, effectively turning the device into a potentially covert Raspberry Pi-class computer under your complete control. The ARM926EJ-SARM processor made its appearance as the embedded CPU in Transcend’s WiFi-enabled SD cards, clocking in at an impressive 426 BogoMips – we can’t possibly leave that territory unexplored, can we?
In this session we root the card’s own CPU, install a more featureful OS, and explore the system’s common and unusual capabilities (in hardware AES encryption and native support for Java bytecode among them). These provide plenty of building blocks for our projects.
I will review the hardware, its capabilities, how to breach its security, and how to enable it with top-class network configuration at boot-up, on nearly any network. I will then show how to build and install additional software and customize the device, using shell script and Perl, for workloads that fit its minute size and low power requirements.
Clearly, complete control of such a hidden computer running with full network connectivity can be used in network penetration scenarios. We’ll discuss applicable security threat countermeasures.
We close the session with a review of similar exploits against hard drive controllers. There is plenty of room at the bottom, and opening these computer-within-the computer configurations create interesting miniaturized automation scenarios alongside the obvious, more ominous security aspects.
Use your newfound knowledge for good, with great power comes great responsibility!
linux.conf.au is a conference about the Linux operating system, and all aspects of the thriving ecosystem of Free and Open Source Software that has grown up around it. Run since 1999, in a different Australian or New Zealand city each year, by a team of local volunteers, LCA invites more than 500 people to learn from the people who shape the future of Open Source. For more information on the conference see https://linux.conf.au/
#linux.conf.au #linux #foss #opensource

Ethical Hacking Tools - Penetration Testing Hardware and Equipment

Some of the popular tools used by hackers and penetration testers when doing network analysis or carrying out attacks. These tools work in real life situations and should be used cautiously. If these tools are misused they can cause actual harm to IT infrastructure which could lead to prosecution. Please only use these tools on networks which you own or have permission to test. I am not responsible for your actions! Knowledge is power but with great power comes great responsibility, use wisely.

I'd like to design my own custom UI for my Monoprice select mini 3D printer.
But before writing some software we obviously need to know our enemy and reverse engineer all the hardware components.
In this video I will go through every single detail in how I reverse engineered the MP SelectMini (or Malyan M200) 3D Printer.
AlternativeIDEVideo: https://www.youtube.com/watch?v=EIkGTwLOD7o
Code on GitHub: https://github.com/robin7331/malyan-m200-display-firmware
Esotool.py: https://github.com/espressif/esptool
If you purchase one of the items below I'll get a small commission from amazon. Thanks for your support!
⚒ Tools I currently use
Rigol DS1054Z http://geni.us/u3k2P0P
Ersa i-CON PICO http://geni.us/u3k2P0P
MP Select Mini 3D Printer http://geni.us/Gfp4
iFixit Pro Tech Toolkit http://geni.us/qFxs
❤️ Enjoying my videos?
I put a lot of effort into every single video.
If you like, help me covering my running costs with a dollar or two.
Patreon: https://www.patreon.com/Robin_Reiter
PayPal: https://www.paypal.me/RobinReiterME
You can also support me by ordering something through one of my affiliate links:
Amazon: http://geni.us/7HDBdR
HappyHacking!

Hack All The Things: 20 Devices in 45 Minutes

When we heard HackAll The Things, we took it as a challenge. So at DEF CON this year we're doing exactly that, we're hacking everything. We've taken all of our previous experience exploiting embedded devices and used it to bring you a presentation filled with more exploits than ever before™. This presentation will feature exploits for over 20 devices including but not limited to TVs, baby monitors, media streamers, network cameras, home automation devices, and VoIP gateways. Gain root on your devices, run unsigned kernels; it's your hardware, it's internet connected, and it's horribly insecure.
More info at: http://Exploitee.rs
Follow us at: @Exploiteers

Hacker culture

The hacker culture is a subculture of individuals who enjoy the intellectual challenge of creatively overcoming and circumventing limitations of systems to achieve novel and clever outcomes. The act of engaging in activities (such as programming or other media) in a spirit of playfulness and exploration is termed "hacking". However, the defining characteristic of a hacker is not the activities performed themselves (e.g. programming), but the manner in which it is done: hacking entails some form of excellence, for example exploring the limits of what is possible, thereby doing something exciting and meaningful. Activities of playful cleverness can be said to have "hack value" and are termed "hacks" (examples include pranks at MIT intended to demonstrate technical aptitude and cleverness). The hacker culture originally emerged in academia in the 1960s around the Massachusetts Institute of Technology (MIT)'s Tech Model Railroad Club (TMRC) and MIT Artificial Intelligence Laboratory.

a Netrunner build, intent on stealth, hacking, and battlefield control; and a Solo build, focused on blunt force and immediate action. Though not showcased in the gameplay video, CD Projekt Red talked about one more playstyle called Techie, which hones in on NightCity's various hardware....

a Netrunner build, intent on stealth, hacking, and battlefield control; and a Solo build, focused on blunt force and immediate action. Though not showcased in the gameplay video, CD Projekt Red talked about one more playstyle called Techie, which hones in on NightCity's various hardware....

a Netrunner build, intent on stealth, hacking, and battlefield control; and a Solo build, focused on blunt force and immediate action. Though not showcased in the gameplay video, CD Projekt Red talked about one more playstyle called Techie, which hones in on NightCity's various hardware....

a Netrunner build, intent on stealth, hacking, and battlefield control; and a Solo build, focused on blunt force and immediate action. Though not showcased in the gameplay video, CD Projekt Red talked about one more playstyle called Techie, which hones in on NightCity's various hardware....

“I called a helpline ... using the ‘one for one’ model ... Tech For Good is a decentralised, global network that emerged in the UK about a decade ago, born of hack weekends when techies and non-techies came together to work on apps, software, hardware – anything that could help tackle social issues ranging from reducing littering to helping the homeless ... ....

Hackers will soon be able to stress-test the Facebook Portal at the annual Pwn2Own hacking contest, following the introduction of the social media giant’s debut hardware device last year. Pwn2Own is one of the largest hacking contests in the world, where security researchers ......